@dblp

Conspiracy and Information Flow in the Take-Grant Protection Model.

. Journal of Computer Security, 4 (4): 331-360 (1996)

Links and resources

Tags